FreeBSD : pear-PEAR -- PEAR installer arbitrary code execution vulnerability (44e5f5bd-4d76-11da-bf37-000fb586ba73)

high Nessus Plugin ID 21421

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Gregory Beaver reports :

A standard feature of the PEAR installer implemented in all versions of PEAR can lead to the execution of arbitrary PHP code upon running the 'pear' command or loading the Web/Gtk frontend.

To be vulnerable, a user must explicitly install a publicly released malicious package using the PEAR installer, or explicitly install a package that depends on a malicious package.

Solution

Update the affected package.

See Also

http://pear.php.net/advisory-20051104.txt

http://www.nessus.org/u?2c3e766d

Plugin Details

Severity: High

ID: 21421

File Name: freebsd_pkg_44e5f5bd4d7611dabf37000fb586ba73.nasl

Version: 1.12

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:pear-pear, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/4/2005

Vulnerability Publication Date: 11/1/2005